HacKer - Chapter 1873
Final-074 crushing dry weeds and smashing rotten wood and resist!
.
Xia Nation Time, July 14th, a little forty in the morning.
The Virtual Transparency screen of the LIPLens-type Information Processor shows that Fish A Needle From The Sea plan is completely accredible, leaving only the missing Ten Thousand unknown IPaddress has not been analyzed.
At the same time, the base point of AONnetwork has accumulated to the extent of 1,389,200,186!
This quantity once again exceeds Shi Lei’s estimated 12 billion data. Nearly 1.4 billion computer EQ uipment infected with Vengeful Goddess Virus provides ANUMnetwork with computing resources for 18 Million Tflops.
Under the impact of such huge computing resources, there is less than the unknown IP address of Ten Thousand. In just five minutes, it is almost analyzed, leaving only less than ten unknown IPaddresses.
Butler’s Parent Server real IPaddress is hidden in it!
Although AONnetwork has 18 Million Tflopscomputing resources, IWNMiwang also has more than 1 Million Tflops’ computing resources.
So much, breaking the computing resources of the sky, and analyzing the remaining unknown IPaddress, can’t be quickly accomplish, only to show that all the rest are hard bones.
The best way, exactly as stated, analyze one by one!
With AONnetwork and IWNMiwang’s computing resources, the remaining IPaddress is broken one by one, which is definitely not an issue.
Tao Wenxian and Raphael obviously understand this truth, and the two are waiting for Shi Lei to make a choice.
Shi Lei counted the remaining IPaddress. There were only eight unknown IPaddresses in total. Shi Lei didn’t make a deliberate selection. He pointed directly to the first unknown IPaddress and smiled and said: “Start from the beginning!”
“Okay!” Tao Wenxian and Raphael are the same.
The three started to invade the first unknown IPaddress, at the very beginning. It does not directly mobilize all computing resources. After all, they have too much computing resources too much, and if they are used indiscriminately, it can easily cause network congestion.
That is not the result Shi Lei needs!
Shi Lei does not destroy, Shi Lei needs the answer!
For the first time, the three used 5 Million Tflops’ computing resources. Such a large amount of computing resources, when they just touched each other’s defense, they rushed to the other party’s defense.
Then I met the block again!
However, Shi Lei already knows that this Identity Information of an unknown IP address is the Internal Network of NSANational Security Agency!
Shi Lei has been cautiously vigilant and never provoked the NSANational Security Agency. Or the DARPAAdvanced Bureau. To the maximum extent, it is also played with the CIACentral Intelligence Agency and the FBIFederal Bureau of Investigation.
If it is determined that the other party is the Internal Network of NSANational Security Agency, Shi Lei definitely silently retreats and cleans up all the intrusion marks.
Then. NSANational Security Agency’s Cyber Security Specialist will also keep track of the choice of not tracking, thus avoiding a senseless battle.
But Shi Lei now has AONnetwork and IWNMiwang, a collection of computing resources close to 20 Million Tflops. How could it be easy to retreat?
Even NSANational Security Agency is obviously not a target object. But Shi Lei still has no retreat opinion.
“Push in and see, scan it and see the NSA guys, knowing Butler’s information!” Shi Lei told.
Tao Wenxian and Raphael invaded with Shi Lei. With the huge computing resources, the NSANational Security Agency’s defense was cracked by almost crying dry weeds and smashing rotten wood.
It’s not that the NSANational Security Agency’s defense is too junk, nor is the NSANational Security Agency’s Cyber Security Specialist too rookie, but the Shi Lei trio is too unreasonable!
They directly used the huge computing resources, unreasonable rampage, and easily defeated the NSANational Security Agency’s defense.
Inside the NSANational Security Agency, it’s the wind!
As the largest intelligence agency of Li Jian Nation, NSANational Security Agency’s confidential Grade very high, otherwise it will not be ridiculed as ‘No.’.
Shi Lei broke through the NSANational Security Agency’s defense and was preparing to scan data inside the National Security Agency and suddenly found that they could not link to the NSANational Security Agency’s Internal Network.
Tao Wenxian sarcastically said: “The NSANational Security Agency, even disconnected from the Network Physical ConNEC tion, is a shame!”
Raphael doesn’t have too much surprise, “NSANational Security Agency, recorded a lot of Li Jian Nation’s black action, disconnecting the network link is normal. They can’t let us, in their Internal Network, casually scan Detection. However, the other party disconnected from the Physical ConNEC tion of the Internet, which means that Butler is not hidden.”
Shi Lei affirmed Raphael’s statement, “Èn! Butler is not under the protection of NSANational Security Agency! Crack the unknown unknown IPaddress!”
NSANational Security Agency is avoiding its front, and Shi Lei does not have any excitement. If placed before, Shi Lei may still be proud of cocky.
But when Ling Yumo’s life is threatened, Shi Lei is not proud of the cocky mind!
Second unknown IPaddress, Shi Lei three people still mobilized 5 Million Tflops computing resources, trying to invade. As in the previous history of the NSANational Security Agency, the huge computing resources easily broke through the defense of the other party.
Shi Lei also identified the identity of the other party at First time.
It turned out to be the CNSCyber Security Intelligence Division of Xia Nation!
Tao Wenxian obviously also identified the target Identity Information. He asked: “Big Brother Stone, is the CNS, do we want to retreat?”
After all, the two are Xia Nation people. At the same time, Mirror Science and Technology Group is also developing within Xia Nation, and it is not so good to attack the CNSCyber Security Intelligence Division.
However, although the intrusion target was the CNSCyber Security Intelligence Division of Xia Nation, Shi Lei only slightly hesitated and decided to continue the invasion.
“Continue to attack!” Shi Lei said indifferently.
The huge computing resources bring incomparable powerful intrusion power. The CNSCyber Security Intelligence Division can’t stop the invasion of the Shi Lei trio.
However, the CNSCyber Security Intelligence Division is exactly the same as the NSANational Security Agency, directly disconnecting the Physical ConNEC tion from the Internet.
Shi Lei is not trying to invade the CNSCyber Security Intelligence Division, but Hope is suspected of excluding the CNSCyber Security Intelligence Division.
As soon as the CNSCyber Security Intelligence Division physically disconnected from the Internet and ruled out the suspects that Butler was hiding, Shi Lei would no longer have trouble finding the CNSCyber Security Intelligence Division.
“Third!” Shi Lei said directly.
……
The three people invaded seven unknown IP addresses in succession, and none of them was the real IP address of the Butler Parent Server, leaving only the last one!
Shi Lei took a deep breath, although in theory, this one must be the real IPaddress of the Butler Parent Server!
But Shi Lei in the heart has a faint worry!
Raphael is also frowns, eight choices, although the choice is from beginning to end, but the first seven are not selected, it is too miserable a little Right?
Tao Wenxian opened his mouth as if he wanted to say something, but he did not say it.
“Stone, are we starting to invade?” Raphael reminded.
Shi Lei focuses on “Good!”
“How many computing resources are called?” Raphael asked.
“As usual!” Shi Lei simply said, so-called as usual, accurately as stated, still mobilizing 5 Million Tflops’ computing resources, the first seven unknown IPaddresses, all defeated by 5 Million Tflops’ computing resources.
The last unknown IP address still uses 5 Million Tflops’ computing resources as the underlying intrusion data.
However, there was no unfavorable intrusion, and at Eighth unknown IPaddress, it was blocked!
That’s right!
5 Million Tflops’ computing resources have been resisted!
Although 5 Million Tflops’ computing resources are not all resources of AONnetwork and IWNMiwang, they are also a huge and irresistible computing resources.
The fact that the first seven unknown IPaddresses have been verified. Including NSANational Security Agency, I can’t resist 5 Million Tflopscomputing resources!
However, the huge computing resources that are not unfavorable have actually been resisted. What channel does the other party obtain from the computing resources?
The current situation is that Shi Lei released Vengeful Goddess Virus, infected with Worldwide’s more than 1.4 billion computer EQ uipment, Worldwide, almost 90% of computer EQ uipment, infected with Vengeful Goddess Virus.
This also means that Shi Lei controls the vast majority of computer EQ uipments in the Worldwide context and collects computing resources that can be collected.
Even if others have the same technology as Shi Lei, they can create Exceed Grade Virus like Vengeful Goddess Virus and no computer EQ uipment for infection.
Shi Lei doesn’t understand, Eighth unknown IPaddress, why can they resist their offense?
Is it an Eighth unknown IPaddress with a private Supercomputer Cluster that has more than 1 Million Tflops’ computing resources?
For this situation, Shi Lei does not believe it at all!
The cost of Supercomputer is not only the cost of parts, but also the huge maintenance costs. Supercomputers require very high maintenance costs when they are running.
If you want to maintain a computing resource in the 1 Million Tflops Supercomputer Cluster, the cost is simply horrifying.
Shi Lei definitely doesn’t believe it, that kind of possibility!
But if it is not a private Supercomputer Cluster, what is the situation, only to resist Shi Lei’s invasion?
(To be continued~^~)